On Tue, 6 Nov 2012, Andrew Deason wrote:

On Wed, 31 Oct 2012 19:50:17 -0400 (EDT)
Benjamin Kaduk <[email protected]> wrote:

However, I don't think it's difficult to generalize this a bit more.
My off-hand guess at some text:

"... It is assumed that such applications will conceptually 'encrypt' a
token by somehow associating the 'encrypted' token with the associated
unencrypted data, and will 'decrypt' an encrypted token by looking up
that association to find the unencrypted data."

But I don't think it is worth spending much time on this; this seems
very unlikely to result in any practical issues.

Fair enough.

Where should we mention the RXGK_SERVER_ENC_TOKEN key usage?
It doesn't really seem right to bump it to rxgk-afs...

The text you pushed to github seems fine (which still has
RXGK_SERVER_ENC_TOKEN right there for encrypted blobs). However, it

I realized after I sent that, that I had gotten a couple of comments out-of-order, and that you had +1'd adding the mention of the key usage in a different spot in the thread. Sorry for that, and thanks for the confirmation.

says:

     If the token is an encrypted blob, it should be encrypted using
     the key usage RXGK_SERVER_ENC_TOKEN.

should that be a SHOULD ?

I don't think so.  If we needed 2119-language, I think it would be a MUST.
But I'm not sure that we need 2119 language. We don't use it when talking about the other key usages, if I remember correctly.

-Ben
_______________________________________________
AFS3-standardization mailing list
[email protected]
http://lists.openafs.org/mailman/listinfo/afs3-standardization

Reply via email to